US9060012B2 - Methods and apparatus for detecting fraud with time based computer tags - Google Patents
Methods and apparatus for detecting fraud with time based computer tags Download PDFInfo
- Publication number
- US9060012B2 US9060012B2 US11/862,165 US86216507A US9060012B2 US 9060012 B2 US9060012 B2 US 9060012B2 US 86216507 A US86216507 A US 86216507A US 9060012 B2 US9060012 B2 US 9060012B2
- Authority
- US
- United States
- Prior art keywords
- computer
- time
- tags
- server
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title abstract description 35
- 238000001514 detection method Methods 0.000 claims abstract description 82
- 235000014510 cooky Nutrition 0.000 claims abstract description 79
- 238000004891 communication Methods 0.000 claims description 14
- 238000004458 analytical method Methods 0.000 claims description 9
- 230000002085 persistent effect Effects 0.000 claims description 5
- 230000001413 cellular effect Effects 0.000 claims description 3
- 238000012502 risk assessment Methods 0.000 claims 1
- 230000000694 effects Effects 0.000 abstract description 14
- 230000002265 prevention Effects 0.000 abstract description 10
- 230000008569 process Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003203 everyday effect Effects 0.000 description 2
- 238000011835 investigation Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000002354 daily effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 230000004941 influx Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/28—Timers or timing mechanisms used in protocols
Definitions
- the invention relates generally to the field of network security, including the detection and prevention of fraudulent transactions or identity theft. More particularly, the invention relates to detecting possible fraudulent transactions online by analyzing time based computer tags.
- the Internet is a tool for everyday use for everyday types of applications. Businesses are increasingly using the Internet as a method of communicating with customers, vendors, employees and conducting business transactions. Conducting business on the Internet is efficient and cost effective, particularly when services and information can be distributed electronically. At the same time it also creates added risk of loss and damage by hackers, identity theft, stolen credit cards, and fraudulent activities.
- One of the most fundamental problems with network security is user authentication—are the people gaining network access authentic or who they claim to be.
- Login names and passwords are one of the most widely used and accepted forms of basic network security. This may be considered a first or primary authentication factor based on something users know or keep in their minds. Online access is provided upon entry of an exact user login/password combination. The identification of valid login names is often trivial, particularly on systems where they are apparently visible or follow a predictable common login format, such as “firstname_lastname” or “firstinitial_lastname.” It is also difficult to secure password information given natural human tendencies. End users often adopt common or simple passwords, share passwords, write down passwords, or select passwords that can be readily guessed. User login and passwords therefore only provide a basic level of security that is not solely relied upon, particularly for financial networks accessible via the Internet such as online banking systems.
- a secondary level or factor of authentication may be relied upon for added security based on something users have in their possession, such as a special purpose hardware device.
- the device such as a token may provide a user with a code as part of the login process.
- the code may be a six digit number that changes at regularly timed intervals and must usually be entered into a device within a specified amount of time.
- the token thus provides a secondary code/password for the user to enter as part of the login process.
- another hardware security device referred to sometimes as a “dongle” may be physically connected to a computer interface such as a USB port. This device may sometimes be used to identify end users connecting from a particular device.
- a fixed system component serial number and other hardware methods used to uniquely identify specific network devices are also used to limit access to “known” devices.
- these methods are plainly visible to the world and can be copied or simulated.
- These systems provide more security but are not perfect and can be impractical in protecting large networks accessible by a large number of users or customers. There is usually a high cost of ownership for such added security measures which are also intrusive and takes away from the user experience.
- IP Internet Protocol
- IP spoofing a technique used by network intruders to make it appear that they are using another device or connecting from a trusted or different IP address.
- the invention provides methods and apparatus for providing network security.
- Various aspects of the invention described herein may be applied to any of the particular applications set forth below or for any other types of networks that is secured and user accessible.
- the invention may be applied as a standalone tool or as part of an integrated software solution against online fraud and identify theft.
- Some preferable embodiments of the invention can be optionally integrated into existing networks and business processes seamlessly including those used by financial and banking institutions. It shall be understood that different aspects of the invention can be appreciated individually, collectively or in combination with each other.
- the invention provides systems and methods for creating and analyzing computer tag information for the prevention or detection of potential fraud.
- Computers and other devices that access the Web may carry device tags in accordance with a preferable embodiment of the invention.
- These device tags may include date and time information that describes when they were issued by a security tag server.
- a server time stamp may be inserted into in a computer tag such as a cookie indicating when it was created.
- the computer tag may be a time stamped cookie that includes “date of creation” or “created” data portions. More preferably, such time stamp information can be encrypted and not apparent as is most cookie related information.
- the computer tags provided herein may be analyzed during future attempts to access a secure network such as a customer attempting to log into an online banking account.
- the invention may be able to detect suspicious activity. For example, recently issued computer tags may be flagged as suspicious for accounts that have not been logged into for a long time or for online accounts that were created for quite some time. Accordingly, physical devices involved in suspicious or fraudulent activity, or devices associated with accounts involved in suspicious activity can be prevented from connecting to a network.
- Another embodiment of the invention provides an advanced fraud detection and prevention system that can reduce the risk of Internet fraud and identity theft.
- the system allows a business to detect a potential problem or hacker by spotting a relatively large number or cluster of recently issued computer tags over a period of time. This may suggest suspicious or illegal behavior based on parameters established by online merchants and others conducting business on the Internet including banks and financial institutions.
- This information can be also used so that a business can make educated decisions about how or whether to authenticate users or customers based at least in part on time stamps, which may be encrypted preferably.
- time stamps which may be encrypted preferably.
- the relevant times of when tags and how many are issued for network devices may be also considered in comparison to the history of accounts or resources to which those devices are attempting to access.
- a method for detecting fraud during a connection of a network device or computer to a financial institution server.
- an application is launched on a network device such as a Web browser through which an online session can begin.
- the financial server may determine that the network device is a registered network device having an assigned computer tag with embedded server time stamp information.
- the computer tag may be a cookie with server time stamp information indicating when it was created.
- the computer tag is then forwarded to a fraud detection system within a secure network environment in which the financial institution server also resides.
- the fraud detection system analyzes the creation or issued date of the computer tag from the network device to determine if there is suspected fraud or unauthorized access. This analysis may include decryption procedures when the time stamp information is preferably encrypted. If the server time stamp information does not suggest fraudulent or improper activity, then access to the financial server is granted to the network device.
- the system protect a secure network with at least one web server and a network device that connects to the web server over a communications network such as the Internet.
- the web server may include a fraud detection means that analyzes a time stamped computer tag stored on the network device. When the network device connects to the web server, information is gathered about the network device tag to determine when it was created by the fraud detection means.
- the fraud detection means may also include a database and means for receiving the time stamped computer tag, storing the tag in the database and associating the tag with user information for possible future use in identifying discernable commonalities or patterns of fraudulent behavior.
- FIG. 1 is a diagram illustrating a computer-implemented electronic transaction network whereby network devices can access a computer network configured with a fraud detection system capable of analyzing time stamped tags associated with network devices
- FIG. 2 is a table of tag information with corresponding time stamps that may be analyzed by fraud detection systems provided in accordance with the invention.
- FIG. 3 is a flowchart describing computer tagging and fraud detection methods provided in accordance with the invention.
- the invention provides systems and methods for fraud detection and prevention. Some of the preferable embodiments of the invention can be applied to detecting and/or preventing attacks on secure networks for online businesses such as financial institutions and banks. It will be appreciated however that the invention may be applied to any type of transaction in which it may be desirable to authenticate a network device or user attempting to access an online accounts or resource over a communications network.
- the computer tags provided in accordance with the invention may preferably exists as encrypted portions of cookies stored in the memory of devices often sent by servers to Web browsers.
- the time stamped computer tags herein may be used in combination with any other information, such as a customer ID number or identifier, a phone number, a drivers license number, a social security number, mailing address, ship to address, credit card number, email address, retail purchase location, and any other information captured during an online purchase or transaction, to identify and minimize transaction fraud and identity theft.
- the fraud detection systems and methods herein may utilize a time stamped computer tag alone or in combination with a device fingerprint or other data that identifies a device in a relatively unique manner.
- FIG. 1 is a diagram illustrating a computer-implemented electronic transaction system consisting of one or more network devices 10 connectable to a secure network 12 .
- the network 12 may be operated by online businesses such as a financial institution which offer online access to customers or other users.
- a fraud detection system 14 may be included as a part of or in communication with the network 12 .
- a fraud detection server 16 and a time stamped computer tag database 22 may be included in the fraud detection system for issuing and storing time stamped computer tags in accordance with the invention.
- a computer tag analyzer 20 may be incorporated into the fraud detection system for analyzing information within tags such as server time stamp information.
- the fraud detection system may be a standalone tool or function as part of an overall secure network operated by the financial institution.
- a financial institution network may be accessible to network devices over a private network or over a communications network 18 such as the Internet (World Wide Web) or any other network that is capable of communicating digital data, including a wireless or cellular network.
- a communications network 18 such as the Internet (World Wide Web) or any other network that is capable of communicating digital data, including a wireless or cellular network.
- the fraud detection server 16 When the fraud detection server 16 is connected to the communications network 18 , the data between network devices 10 such as those used by banking customers, and the fraud detection server may be encrypted or travel over a virtual private network to ensure privacy and security.
- the network devices 10 may connect to a financial institution network as shown over the communications network 18 using well known data protocols such as HTTP, HTTPS and the like.
- a financial institution may provide a banking service such as online account access to each network device connected to it, and it may perform electronic transactions with network devices such as authorizing electronic payment or transfer of funds. Such electronic transactions are susceptible to fraud and each network device can be tagged in accordance with the invention to reduce the risk of
- the fraud detection server 16 and computer tag analyzer 20 may receive and process account information and time stamped computer tag information from network devices 10 accessing the secure network 12 . At least some of this information can be analyzed by the tag analyzer 20 to determine device related or server time stamp information indicating when the tag was issued by fraud detection server 16 .
- These and other computer analyzers used in accordance with the invention herein include devices that analyze given data such as computer tag and cookie information. They can examine in detail the contents or structure of the given data and can try to find patterns and relationships between parts of the data or other information accessible by the fraud detection system. Such computer analyzers can be pieces of hardware and/or software programs running on one or more computers within the systems provided herein.
- a fraud detection system may detect fraudulent activities across the electronic transaction network.
- the fraud detection servers/systems may also uniquely track physical devices, register unique devices, track end-user logins, associate an end-user account with one or more specific devices, associate a device with one or more end-user accounts, and consider this information along with other computer tag information.
- a preferable embodiment of the invention provides downloaded computer tags or cookies having encrypted server time stamps indicating when they were created and delivered to devices.
- the use of encrypted time stamps can be implemented with any of the embodiments of the invention described herein.
- a cookie may be downloaded and stored in device memory.
- the time stamp information (7/31/2007 7:40 PM) may be encrypted by the fraud detection system according a selected encryption key or algorithm as known in the field.
- the seemingly irrelevant or indecipherable set of characters (ABC123GH XY45) may have no meaning other than for purposes of the fraud detection system.
- the time stamped cookie is delivered to the fraud detection system for analysis in accordance with the invention (see FIG. 1 ).
- the time stamp information may be decrypted by the fraud detection system and reviewed to determine when it was issued by the fraud detection server/system. With this time stamp information, the fraud detection analyzer and system may perform fraud prevention and detection functions in accordance with other aspects of the invention described herein.
- a network device may request access to a electronic transaction network and a particular account for an online business such as e-Bay, Amazon.com, Bank of America, or other e-commerce company.
- a user typically completes a log in and authentication procedure through the network device.
- the tag information along with its server time stamp information can be passed onto the fraud detection server and system for analysis.
- at least the server time stamp information in the computer tag is encrypted by the fraud detection server so it is not obvious and readily manipulated.
- the encrypted time stamp information can be decrypted by the fraud detection server according to whatever encryption algorithms or methods are selected by and known only to or controlled by the online business or financial institution.
- the computer tag may exist in the form of a cookie (a HTTP cookie, a Web cookie) stored in the memory of the device along with other information commonly used to facilitate the exchange of information between a browser and web server.
- Encrypted time stamp information may be included with the other data usually found in the cookie text files such as an expiration date, a path, and domain name.
- the network devices may be assigned a new computer tag by the fraud detection system in accordance with another embodiment the invention with a time stamp having a current issue date or time.
- a computer tag may be downloaded to a device from the fraud detection system to perform its “tagging.” The system may subsequently request and determine if the device already has a time stamped computer tag from the server or will request a new time stamped computer tag if none exists for the network devicee.
- Network devices described herein may be a variety of communication devices including but not limited to a personal computer, server computer, laptop computer, personal digital assistant (PDA) such as a Palm-based device or Windows CE device, a cellular phone, a wireless device such as a wireless email device or other device capable of communicating wirelessly with a computer network or any other computing resource that has the processor, memory and input/output capabilities to be able to communicate with a computer network and handle electronic transactions.
- PDA personal digital assistant
- the network device may also be a telephone, for example, to order items from a mail order catalog.
- the network device is a personal computer with a display such as cathode ray tube or liquid crystal display (LCD) for displaying information and images to the user of the network device.
- LCD liquid crystal display
- One or more input/output devices such as keyboards and a mouse permit the user to operate the network device and to permit it to access the Web.
- the device can be connected to a communications network via a network interface card, cable modem, a DSL modem, wireless modem, telephone line modem and other hardware.
- the network device may further comprise one or more processors, memory storage devices, including an optical tape drive or optical drive, a hard disk drive, or flash memory, so the device memory can store data even when the computer system is powered down. Also other a memory such as SRAM, DRAM, or SDRAM may be included to temporarily store data being executed by the processor.
- the secure networks accessed by network devices herein may be a combination of one or more Web-based server computer(s), such as web servers, an application server, a database server, etc., that are capable of communicating with network devices over a communications network, such as the Internet or a wireless network and is capable of downloading web pages or a software application to the network device.
- the secure network may comprise one or more processors, one or more persistent storage devices and memory.
- the network memory may store (and the processor(s) may run) a server operating system and a transaction processing software system to facilitate electronic transactions between the secure network and network devices.
- a computer tag system may include server computers within a secure network that can also access databases with related user account history and log-in information.
- a computer tag may be created, delivered and stored on a client computer preferably as a small block of data or (persistent) cookie that facilitates exchanges with the secure network.
- the computer tag includes server time stamp information, preferably encrypted by the computer tag system before delivery to the client.
- the computer tag may be stored within a computer memory residing on the client computer that is analyzed when connected to the secure network.
- the computer tag can be delivered to the client computer through conventional methods and imbedded within a common software product like a web browser, or even imbedded in hardware or memory, any of which would be accessible when a connection to the network is established.
- a computer tag can also be delivered on demand, through a JavaScript, ActiveX control, or similar technology as a user connects to a secure network through a web browser.
- Other user related information that is accessible to the secure network can be considered together with time stamped computer tag or cookie information provided herein.
- Browsers may be configured to store into a computer memory time stamped computer tags provided in accordance with the invention.
- the computer tags herein may constitute an entire cookie or included as part of a cookie commonly used with Web browsers.
- a cookie contains data or messages that facilitate online sessions between network device and (Web) servers or sites over the Internet.
- Web network device
- a graphical user interface for a personal computer may permit the user to execute a browser application program such as Mozilla Firefox, Netscape Navigator and Microsoft Internet Explorer.
- the browser options may be selected to enable or allow the download of cookies or computer tags with server time stamp information from fraud detection systems described herein.
- the information or data within cookies can be modified in accordance in a preferable embodiment of the invention with time stamp information while still allowing them to fulfill their common purpose of identifying users and preparing customized or personalized web pages.
- One of the benefits of provided by this aspect of the invention is the ability to exploit a relatively small amount of data in a manner that can largely escape the attention of a hacker.
- Server time stamp information is a piece of information that can be used as a marker for fraudulent activity when pieced together with other account information as described herein. When encrypted/decrypted, this information may become even less noticeable or of concern to hackers yet exploited and recognized in particular by fraud detection systems herein.
- cookies can be sent back to servers when logging on or when pages are requested.
- certain information about that person such as name and preferences can be requested and retained. This information can be packaged into a cookie along with server time/date (time stamp) information according to a server computer clock that will be sent back to the Web browser and stored for future use.
- Persistent or permanent cookies are preferably selected herein and stored in a device memory (hard drive) between sessions and logins until it expires at a certain expiration date or is deleted. The next time the user logs on or requests a page or information from the Web site, the browser can send the previously issued cookie along with its package information and time stamp information in accordance with the invention.
- a fraud detection system within a site network can also detect the possibility of fraud in accordance with the invention.
- the time stamp information can be analyzed by the fraud detection system provided herein to determine if the cookie was recently issued. For many authorized users who would not ordinarily delete computer cookies or tags, such time stamp information would not be particularly recent (e.g., weeks, months old). Meanwhile, fraudsters or hackers will often delete cookies from their computers before attacking web servers and computer systems. In some instances, recently issued cookies may be only a few minutes or hours old in comparison to days or weeks.
- So hacker accesses to web servers will usually result in having either no cookies, in which case they can be immediately issued new time stamped cookies as described herein, or recently issued cookies as determined by a fraud detection system or methods herein.
- the fraud detection system can consider the frequency and number of recently issued cookies in combination with other patterns or parameters relied upon in detecting potential fraud as designated or relied upon by the online business.
- the fraud detection server may initiate the storage of a time stamped cookie on a user computer system in a variety of ways. For example, to build and store the cookie, the fraud detection server may generate an identifier to a cookie builder which may correspond to a particular user or not (random or arbitrary).
- the cookie builder may include the user identifier into the cookie and may add other status information to the cookie, plus a server time stamp.
- the identifier and the other information may be processed by a cookie signer optionally, which signs the cookie using conventional cryptographic techniques, such as by hashing the identifier, and optionally the other information, using a secret hash key to produce a hash result referred to herein as the cookie signature.
- the cookie signer may provide the cookie signature, identifier and time stamp information (collectively referred to as the cookie) to a cookie encryptor, which preferably encrypts the cookie using conventional encryption techniques, such as using the public key of a public key/private key pair or using a symmetric key.
- the cookie encryptor may then direct the cookie to a user browser for storage of the encrypted cookie in cookie storage location on the user computer or device via various communication and network interfaces, and optionally over an SSL connection.
- the storage of the cookies may be accomplished in conventional memory or disk storage and may be a portion (cookie folder) thereof used for the storage of cookies.
- the memory may be another part of the user computer system or may reside in a removable device such as a smart card, USB memory token a portable memory device that interfaces to a personal computer through a USB port, such as the USB Memory Key or the like.
- a cookie is selected in this described embodiment, other types of encrypted data or files, certificates or other similar data structures may be used in accordance with the concepts of the invention.
- a user may request a page from a Web site through a browser during a session with an online business such as a bank or financial institution.
- the browser may send a request to a server within a secure network via communication interfaces and network.
- the communication interfaces can pass the request to a Web application running within the secure network, which can be conventional application programs modified for various applications such as online banking.
- the Web application may authenticate the user and facilitate various kinds of transactions.
- the fraud detection systems herein may read the encrypted cookie provided by the browser from a cookie storage area.
- the encrypted cookie may be passed to a fraud detection server and cookie analyzer (see FIG. 1 ), which can be configured with a cookie decryptor to decrypt the encrypted cookie, and then separate or consider the time stamp information aside from the remainder of the cookie for analysis such as determining how old is the cookie or when it was created.
- a secure network administrator or fraud analyst can actively screen information for various accounts. These accounts may be identified by the fraud detection system according to time stamped computer tags sharing the same or substantially the same creation date/time. Suspicious accounts may be identified for further investigation by fraud analysts. For example, a number of accounts with stated addresses may be logged in from the same network device with all newly created computer tags—this may be flagged or identified as suspicious.
- the fraud detection and preventing systems herein may also automatically or manually generate information related to collected time stamped computer tag information to identify spikes or large numbers of computer tags issued or created with a particular server creation date/time.
- the invention takes into consideration that many attackers or hackers are likely to access relatively large numbers of different accounts within a particular network and within a particular time frame. Large or massive scale hacking may be performed quickly with automated computers and programs. By comparing accesses to multiple accounts by a device bearing the same or near same computer tag and recent time stamp information, it may be possible to detect patterns of unauthorized access. It shall be understood that the invention may be applied with other systems and methods which authenticate or uniquely identify devices according to a device fingerprint or identifier including but not limited to those described in U.S. patent application Ser. No. 11/241,739 filed on Sep. 29, 2005, US 2006/0048211 (Pierson et al.) and U.S. Pat. No. 7,100,049 (Gasparini et al.) which are incorporated by reference in their entirety herein.
- Additional information about users may be maintained and also used for further fraud analysis by the systems and methods herein such as last successful login date and time, last unsuccessful login date and time, total successful logins, total unsuccessful logins, etc.
- FIG. 2 is a computer tag information table listing corresponding time stamps for a set of exemplary tags.
- Various tag and time stamp tables provided in accordance with this aspect of the invention can be stored in databases and analyzed by fraud detection systems provided herein (see FIG. 1 ).
- a tag number (TAG # 1 ) can be any arrangement of numbers and/or characters that are issued by a fraud detection server for devices previously without tags.
- the time stamp information can be set to a selected computer clock, preferably to a server computer clock for one or more of the fraud detection servers within a fraud detection system. Any format indicating time can be applied to the invention that includes date and/or time information.
- time stamps include date information
- the month/day/year (7/12/2007) format can be used as illustrated or other formats can be used (7/12/2007, 12/7/07, July 12, 2007).
- Time stamps provided here can also include hour and minute information in various formats too (4:25 pm, 4:25:55, 16:25 pm PDT). It shall be understood that the various kinds of time stamp information described herein can be stored, modified and encrypted/decrypted as known by those skilled in the art.
- a preferable embodiment of the invention provides a fraud detection system that can monitor suspected fraudulent activity by utilizing one or more time stamp databases stored in a computer readable memory.
- a fraud detection server can access and update a time stamp database with information obtained from computer tags retrieved from devices trying to access a secure network (see FIG. 1 ).
- the time stamped computer tags on devices may be analyzed by the fraud detection system to indicate when it was generated and if it was recently issued.
- the likelihood of fraud being committed by the particular end-user with the network device is determined so that appropriate action may be taken.
- a (threshold) number of accounts when accessed within a predetermined period of time all having recently issued computer tags within a particular period of time (e.g., 1 hour), some or all of these accounts may be flagged for potential fraud and further investigation.
- a recently issued tag may be received from a device trying to access an account that had not been logged into for a long time.
- computer tags or cookies are not deleted or disabled from a device in order to permit interaction with most Internet Web sites and servers.
- Other conditions or possible indicators of unauthorized access include a device trying to access a relatively older account that was created long time ago.
- a network device may be initially granted access to the network and an online account to perform an electronic transaction. If fraudulent activity occurs during this electronic transaction, the time stamp information associated with the network device may be also stored in a database within the fraud detection system for possibly detecting other instances of fraud with network devices having similarly dated computer tags. In this manner, the online business can utilize such fraud information selectively so that a fraud committed in one account is logged into and tracked by the fraud detection system. Accordingly, a user or network device that has committed fraudulent activities may be tracked even when the network device is used to log into a different account.
- the fraud detection server/system and computer tag systems herein may comprise administrative components including a web admin module or a reports module.
- the web admin module may permit administrator level management of the secure network to perform various functions such as to tuning or setting its fraud tolerance levels, inspecting and changing individual customers fraud status, and checking relationships and activity of customers to one another.
- a financial institution may be able to detect an influx or sudden spike of newly created computer tags associated for the accounts for its online customers within a particular period of time.
- a reports module may also help a business keep apprised of existing accounts suspected of fraud as well as their historical information.
- the fraud detection servers herein may be a stand-alone computing device, such as a server computer, although its functions may be distributed among various devices as described above.
- the fraud server may include one or more processors and persistent storage devices and memory as described above.
- the fraud server may further include a database server/manager that stores the time stamped computer tag in accordance with the invention.
- a fraud detection server memory may store a server operating system, an a variety of software modules including an administrator software module, a fraud detector software module, a reports software module and a tagger software module wherein each module comprises a plurality of instructions (and associated data) that are executed by the processor to implement the fraud detection and preventing system and methods herein.
- the administrator module may generate administrator web pages that determine how a user can interact with the system and configuring the system.
- the administrator web pages may permit modification of how the fraud detection server and analyzers process time stamped computer tag information herein.
- the reports software module can provides reports with information from the fraud detection and prevention system and its databases.
- the system may generate a report showing the daily change report such as a fraud report listing the network devices that possessed similar computer tags or cookies created at or around the same date/time, their status, or a shared computer report listing all of the network devices that have multiple computer tags or cookies associated with them.
- the fraud detector software module may contain the instructions and logic to process analyzed data relating to the network devices and users. This program may determine relationships and possible correlations between network devices and the time stamped computer tags provided herein.
- Another aspect of the invention provides protocols and methods for detecting possible fraud by analyzing time stamped computer tags.
- computer tagging and fraud detection methods are provided herein. For example, when a user attempts to log on to a Web site server, the fraud detection system/analyzer may be alerted to check or analyze a time stamped computer tag retrieved from the user device. If the device does not have one already, then a new time stamped computer tag can be generated by the fraud detection server as described herein. New devices can be tagged herein by a variety of methods including the downloading of time stamped cookies containing encrypted creation time/date information stored in device memory. If the device already has a time stamped computer tag, it can be analyzed so that time stamp information can be retrieved.
- a decryption step may be performed by a computer tag analyzer when time stamp information is encrypted according to methods selected ahead of time by the fraud detection system.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (12)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/862,165 US9060012B2 (en) | 2007-09-26 | 2007-09-26 | Methods and apparatus for detecting fraud with time based computer tags |
EP08165224A EP2043328A3 (en) | 2007-09-26 | 2008-09-26 | Methods and apparatus for detecting fraud with time based computer tags |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/862,165 US9060012B2 (en) | 2007-09-26 | 2007-09-26 | Methods and apparatus for detecting fraud with time based computer tags |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090083184A1 US20090083184A1 (en) | 2009-03-26 |
US9060012B2 true US9060012B2 (en) | 2015-06-16 |
Family
ID=40261265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/862,165 Active US9060012B2 (en) | 2007-09-26 | 2007-09-26 | Methods and apparatus for detecting fraud with time based computer tags |
Country Status (2)
Country | Link |
---|---|
US (1) | US9060012B2 (en) |
EP (1) | EP2043328A3 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9196004B2 (en) | 2006-03-31 | 2015-11-24 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US9390384B2 (en) | 2008-07-01 | 2016-07-12 | The 41 St Parameter, Inc. | Systems and methods of sharing information through a tagless device consortium |
CN105827608A (en) * | 2016-03-31 | 2016-08-03 | 微梦创科网络科技(中国)有限公司 | Distributed API service abnormal user identification analysis method and reverse agent service gateway |
CN106210091A (en) * | 2016-07-18 | 2016-12-07 | 百融(北京)金融信息服务股份有限公司 | Mark generates and management method and system |
US9521551B2 (en) | 2012-03-22 | 2016-12-13 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US9633201B1 (en) | 2012-03-01 | 2017-04-25 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US9703983B2 (en) | 2005-12-16 | 2017-07-11 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US9754256B2 (en) | 2010-10-19 | 2017-09-05 | The 41St Parameter, Inc. | Variable risk engine |
US9948629B2 (en) | 2009-03-25 | 2018-04-17 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US9990631B2 (en) | 2012-11-14 | 2018-06-05 | The 41St Parameter, Inc. | Systems and methods of global identification |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US10417637B2 (en) | 2012-08-02 | 2019-09-17 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US10453066B2 (en) | 2003-07-01 | 2019-10-22 | The 41St Parameter, Inc. | Keystroke analysis |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US11151568B2 (en) * | 2018-05-09 | 2021-10-19 | Capital One Services, Llc | Real-time selection of authentication procedures based on risk assessment |
US11164206B2 (en) * | 2018-11-16 | 2021-11-02 | Comenity Llc | Automatically aggregating, evaluating, and providing a contextually relevant offer |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US11314838B2 (en) | 2011-11-15 | 2022-04-26 | Tapad, Inc. | System and method for analyzing user device information |
US11538063B2 (en) | 2018-09-12 | 2022-12-27 | Samsung Electronics Co., Ltd. | Online fraud prevention and detection based on distributed system |
US11605087B2 (en) * | 2018-08-15 | 2023-03-14 | Advanced New Technologies Co., Ltd. | Method and apparatus for identifying identity information |
Families Citing this family (84)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7853533B2 (en) * | 2004-03-02 | 2010-12-14 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US20060010072A1 (en) * | 2004-03-02 | 2006-01-12 | Ori Eisen | Method and system for identifying users and detecting fraud by use of the Internet |
US8943304B2 (en) | 2006-08-03 | 2015-01-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
US9692725B2 (en) | 2005-05-26 | 2017-06-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
US9407608B2 (en) | 2005-05-26 | 2016-08-02 | Citrix Systems, Inc. | Systems and methods for enhanced client side policy |
US9621666B2 (en) | 2005-05-26 | 2017-04-11 | Citrix Systems, Inc. | Systems and methods for enhanced delta compression |
US7818264B2 (en) | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
US7739169B2 (en) * | 2007-06-25 | 2010-06-15 | Visa U.S.A. Inc. | Restricting access to compromised account information |
US8121942B2 (en) | 2007-06-25 | 2012-02-21 | Visa U.S.A. Inc. | Systems and methods for secure and transparent cardless transactions |
US8191117B2 (en) * | 2007-10-25 | 2012-05-29 | Anchorfree, Inc. | Location-targeted online services |
AU2009311303B2 (en) * | 2008-11-06 | 2015-09-10 | Visa International Service Association | Online challenge-response |
US8782134B2 (en) | 2009-11-23 | 2014-07-15 | Microsoft Corporation | Common organization estimation at registration |
CA2791568C (en) * | 2010-03-23 | 2018-10-16 | Google Inc. | Conversion path performance measures and reports |
US9535994B1 (en) * | 2010-03-26 | 2017-01-03 | Jonathan Grier | Method and system for forensic investigation of data access |
KR101407060B1 (en) | 2010-10-27 | 2014-06-13 | 한국전자통신연구원 | Method for analysis and validation of online data for digital forensics and system using the same |
EP2659650B1 (en) | 2010-12-29 | 2022-06-22 | Citrix Systems Inc. | Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination |
US20120296826A1 (en) * | 2011-05-18 | 2012-11-22 | Bytemark, Inc. | Method and system for distributing electronic tickets with visual display |
US10762733B2 (en) | 2013-09-26 | 2020-09-01 | Bytemark, Inc. | Method and system for electronic ticket validation using proximity detection |
US9122981B1 (en) * | 2011-06-15 | 2015-09-01 | Amazon Technologies, Inc. | Detecting unexpected behavior |
US9547693B1 (en) | 2011-06-23 | 2017-01-17 | Palantir Technologies Inc. | Periodic database search manager for multiple data sources |
AU2011101296B4 (en) | 2011-09-15 | 2012-06-28 | Uniloc Usa, Inc. | Hardware identification through cookies |
US8849703B2 (en) | 2012-04-16 | 2014-09-30 | Wal-Mart Stores, Inc. | Processing online transactions |
US20130282562A1 (en) * | 2012-04-23 | 2013-10-24 | Erika Gallo | Systems and methods for preventing fraudulent purchases |
US8903717B2 (en) | 2013-03-15 | 2014-12-02 | Palantir Technologies Inc. | Method and system for generating a parser and parsing complex data |
US8930897B2 (en) | 2013-03-15 | 2015-01-06 | Palantir Technologies Inc. | Data integration tool |
US9230280B1 (en) | 2013-03-15 | 2016-01-05 | Palantir Technologies Inc. | Clustering data based on indications of financial malfeasance |
US9965937B2 (en) | 2013-03-15 | 2018-05-08 | Palantir Technologies Inc. | External malware data item clustering and analysis |
US8855999B1 (en) | 2013-03-15 | 2014-10-07 | Palantir Technologies Inc. | Method and system for generating a parser and parsing complex data |
US10275778B1 (en) | 2013-03-15 | 2019-04-30 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive investigation based on automatic malfeasance clustering of related data in various data structures |
US8788405B1 (en) * | 2013-03-15 | 2014-07-22 | Palantir Technologies, Inc. | Generating data clusters with customizable analysis strategies |
US9438626B1 (en) * | 2013-06-18 | 2016-09-06 | Emc Corporation | Risk scoring for internet protocol networks |
US9116975B2 (en) | 2013-10-18 | 2015-08-25 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores |
US10579647B1 (en) | 2013-12-16 | 2020-03-03 | Palantir Technologies Inc. | Methods and systems for analyzing entity performance |
US9552615B2 (en) | 2013-12-20 | 2017-01-24 | Palantir Technologies Inc. | Automated database analysis to detect malfeasance |
US10356032B2 (en) | 2013-12-26 | 2019-07-16 | Palantir Technologies Inc. | System and method for detecting confidential information emails |
US8832832B1 (en) | 2014-01-03 | 2014-09-09 | Palantir Technologies Inc. | IP reputation |
US9009827B1 (en) | 2014-02-20 | 2015-04-14 | Palantir Technologies Inc. | Security sharing system |
JP5613855B1 (en) * | 2014-04-23 | 2014-10-29 | 株式会社 ディー・エヌ・エー | User authentication system |
US9619557B2 (en) | 2014-06-30 | 2017-04-11 | Palantir Technologies, Inc. | Systems and methods for key phrase characterization of documents |
US9535974B1 (en) | 2014-06-30 | 2017-01-03 | Palantir Technologies Inc. | Systems and methods for identifying key phrase clusters within documents |
US9256664B2 (en) | 2014-07-03 | 2016-02-09 | Palantir Technologies Inc. | System and method for news events detection and visualization |
US9202249B1 (en) | 2014-07-03 | 2015-12-01 | Palantir Technologies Inc. | Data item clustering and analysis |
US9785773B2 (en) | 2014-07-03 | 2017-10-10 | Palantir Technologies Inc. | Malware data item analysis |
US9021260B1 (en) | 2014-07-03 | 2015-04-28 | Palantir Technologies Inc. | Malware data item analysis |
US10572496B1 (en) | 2014-07-03 | 2020-02-25 | Palantir Technologies Inc. | Distributed workflow system and database with access controls for city resiliency |
US10402557B2 (en) | 2014-09-10 | 2019-09-03 | Uniloc 2017 Llc | Verification that an authenticated user is in physical possession of a client device |
US9043894B1 (en) | 2014-11-06 | 2015-05-26 | Palantir Technologies Inc. | Malicious software detection in a computing system |
US9348920B1 (en) | 2014-12-22 | 2016-05-24 | Palantir Technologies Inc. | Concept indexing among database of documents using machine learning techniques |
US9367872B1 (en) | 2014-12-22 | 2016-06-14 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures |
US10552994B2 (en) | 2014-12-22 | 2020-02-04 | Palantir Technologies Inc. | Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items |
US10362133B1 (en) | 2014-12-22 | 2019-07-23 | Palantir Technologies Inc. | Communication data processing architecture |
US9817563B1 (en) | 2014-12-29 | 2017-11-14 | Palantir Technologies Inc. | System and method of generating data points from one or more data stores of data items for chart creation and manipulation |
CN105844526A (en) * | 2015-01-14 | 2016-08-10 | 阿里巴巴集团控股有限公司 | Networked transaction risk identification method and networked transaction risk identification device based on computer system |
US10152480B2 (en) * | 2015-01-31 | 2018-12-11 | Splunk Inc. | Archiving indexed data |
WO2016179391A1 (en) * | 2015-05-07 | 2016-11-10 | Contractfit, Limited | System and method for identifying fraudulent communication attempts |
US10103953B1 (en) | 2015-05-12 | 2018-10-16 | Palantir Technologies Inc. | Methods and systems for analyzing entity performance |
US9454785B1 (en) | 2015-07-30 | 2016-09-27 | Palantir Technologies Inc. | Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data |
US9456000B1 (en) | 2015-08-06 | 2016-09-27 | Palantir Technologies Inc. | Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications |
KR102554813B1 (en) | 2015-08-17 | 2023-07-11 | 바이트마크 아이엔씨. | Short-Range Wireless Implementation Methods and Systems for Hands-Free Toll Approval |
US11803784B2 (en) | 2015-08-17 | 2023-10-31 | Siemens Mobility, Inc. | Sensor fusion for transit applications |
US10489391B1 (en) | 2015-08-17 | 2019-11-26 | Palantir Technologies Inc. | Systems and methods for grouping and enriching data items accessed from one or more databases for presentation in a user interface |
US9485265B1 (en) | 2015-08-28 | 2016-11-01 | Palantir Technologies Inc. | Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces |
KR102389576B1 (en) | 2016-01-08 | 2022-04-22 | 삼성전자주식회사 | Apparatus and method for detecting counterfeit advertiser in wireless communication system |
US10318630B1 (en) | 2016-11-21 | 2019-06-11 | Palantir Technologies Inc. | Analysis of large bodies of textual data |
US10620618B2 (en) | 2016-12-20 | 2020-04-14 | Palantir Technologies Inc. | Systems and methods for determining relationships between defects |
US10325224B1 (en) | 2017-03-23 | 2019-06-18 | Palantir Technologies Inc. | Systems and methods for selecting machine learning training data |
US10606866B1 (en) | 2017-03-30 | 2020-03-31 | Palantir Technologies Inc. | Framework for exposing network activities |
US10235461B2 (en) | 2017-05-02 | 2019-03-19 | Palantir Technologies Inc. | Automated assistance for generating relevant and valuable search results for an entity of interest |
US10482382B2 (en) | 2017-05-09 | 2019-11-19 | Palantir Technologies Inc. | Systems and methods for reducing manufacturing failure rates |
US10838987B1 (en) | 2017-12-20 | 2020-11-17 | Palantir Technologies Inc. | Adaptive and transparent entity screening |
US11019090B1 (en) * | 2018-02-20 | 2021-05-25 | United Services Automobile Association (Usaa) | Systems and methods for detecting fraudulent requests on client accounts |
US11119630B1 (en) | 2018-06-19 | 2021-09-14 | Palantir Technologies Inc. | Artificial intelligence assisted evaluations and user interface for same |
RU2724783C1 (en) * | 2018-12-28 | 2020-06-25 | Акционерное общество "Лаборатория Касперского" | Candidate fingerprint matching and comparison system and method |
US10778681B1 (en) | 2019-04-12 | 2020-09-15 | Capital One Services, Llc | Using common identifiers related to location to link fraud across mobile devices |
CN110163314A (en) * | 2019-04-15 | 2019-08-23 | 深圳壹账通智能科技有限公司 | A kind of anti-method, apparatus, computer system and readable storage medium storing program for executing of registering of practising fraud |
US11086948B2 (en) | 2019-08-22 | 2021-08-10 | Yandex Europe Ag | Method and system for determining abnormal crowd-sourced label |
US11710137B2 (en) | 2019-08-23 | 2023-07-25 | Yandex Europe Ag | Method and system for identifying electronic devices of genuine customers of organizations |
US11108802B2 (en) | 2019-09-05 | 2021-08-31 | Yandex Europe Ag | Method of and system for identifying abnormal site visits |
RU2757007C2 (en) | 2019-09-05 | 2021-10-08 | Общество С Ограниченной Ответственностью «Яндекс» | Method and system for detecting malicious actions of certain type |
US11334559B2 (en) | 2019-09-09 | 2022-05-17 | Yandex Europe Ag | Method of and system for identifying abnormal rating activity |
US11128645B2 (en) | 2019-09-09 | 2021-09-21 | Yandex Europe Ag | Method and system for detecting fraudulent access to web resource |
RU2752241C2 (en) | 2019-12-25 | 2021-07-23 | Общество С Ограниченной Ответственностью «Яндекс» | Method and system for identifying malicious activity of predetermined type in local network |
US11539676B2 (en) * | 2020-11-12 | 2022-12-27 | Bank Of America Corporation | Encrypted tagging system for protection of network-based resource transfers |
US11743280B1 (en) * | 2022-07-29 | 2023-08-29 | Intuit Inc. | Identifying clusters with anomaly detection |
Citations (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0418144A1 (en) | 1989-09-12 | 1991-03-20 | André MICHAUD | Method for limiting risks connected to a computer transaction |
US5748740A (en) | 1995-09-29 | 1998-05-05 | Dallas Semiconductor Corporation | Method, apparatus, system and firmware for secure transactions |
US5764275A (en) | 1991-11-20 | 1998-06-09 | Thomson Multimedia S.A. | Interactive television security through transaction time stamping |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
EP0923039A1 (en) | 1997-12-12 | 1999-06-16 | SellectSoft L.C. | Electronic couponing method and apparatus |
US6092053A (en) | 1998-10-07 | 2000-07-18 | Cybercash, Inc. | System and method for merchant invoked electronic commerce |
US6105012A (en) | 1997-04-22 | 2000-08-15 | Sun Microsystems, Inc. | Security system and method for financial institution server and client web browser |
US6112240A (en) | 1997-09-03 | 2000-08-29 | International Business Machines Corporation | Web site client information tracker |
US6148407A (en) | 1997-09-30 | 2000-11-14 | Intel Corporation | Method and apparatus for producing computer platform fingerprints |
US6163771A (en) | 1997-08-28 | 2000-12-19 | Walker Digital, Llc | Method and device for generating a single-use financial account number |
WO2001011450A1 (en) | 1999-08-05 | 2001-02-15 | Sun Microsystems, Inc. | Single sign-on framework with trust-level mapping to authentication requirements |
US6205436B1 (en) | 1994-04-28 | 2001-03-20 | Citibank, N.A. | Trusted agents for open electronic commerce where the transfer of electronic merchandise or electronic money is provisional until the transaction is finalized |
US20010016876A1 (en) | 2000-02-19 | 2001-08-23 | Gerold Kurth | Method and apparatus to provide high precision packet traversal time statistics in a heterogeneous network |
WO2001095550A2 (en) | 2000-06-06 | 2001-12-13 | Ontime Networks As | Distributing time information in a communication network |
US20020035622A1 (en) | 2000-06-07 | 2002-03-21 | Barber Timothy P. | Online machine data collection and archiving process |
US20020056042A1 (en) | 1999-06-23 | 2002-05-09 | Van Der Kaay Erik H. | System and methods for generating trusted and authenticatable time stamps for electronic documents |
US20020073046A1 (en) | 1999-07-30 | 2002-06-13 | David Sancho Enrique | System and method for secure network purchasing |
US20020073327A1 (en) * | 1998-01-14 | 2002-06-13 | Vellandi Henry P. | Electronic bookshelf with multi-user features |
US20020112171A1 (en) * | 1995-02-13 | 2002-08-15 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20020153424A1 (en) | 2001-04-19 | 2002-10-24 | Chuan Li | Method and apparatus of secure credit card transaction |
US20020156836A1 (en) | 2001-04-24 | 2002-10-24 | Janosik John Louis | Method for extracting personalization information from web activity |
EP1256911A1 (en) | 2001-05-07 | 2002-11-13 | Cegetel | Securization method for a payment from a client to a merchant, associated location server and system |
WO2002091226A1 (en) | 2001-05-08 | 2002-11-14 | Rolf Fey | Method for detecting and identifying accesses to electronic documents |
US20020167965A1 (en) | 2001-01-18 | 2002-11-14 | James Beasley | Link context mobility method and system for providing such mobility, such as a system employing short range frequency hopping spread spectrum wireless protocols |
US20030033356A1 (en) | 2001-08-13 | 2003-02-13 | Luu Tran | Extensible client aware detection in a wireless portal system |
WO2003025868A1 (en) | 2001-09-17 | 2003-03-27 | Interline Networks Pty Ltd | A method and system for reducing the risk of credit card fraud |
US20030070080A1 (en) | 1991-11-15 | 2003-04-10 | Rosen Sholom S. | Electronic-monetary system |
US20030076242A1 (en) | 2001-09-25 | 2003-04-24 | Burns Gordon R. | Utility meter having computer network access for receiving an interpretive language program to implement new meter functionality |
US20030105854A1 (en) | 2000-07-06 | 2003-06-05 | Vilhjalmur Thorsteinsson | Method and system for controlling and coordinating devices and appliances, such as from a central portal and via a wide-area communications network |
US20030115334A1 (en) | 2001-11-05 | 2003-06-19 | Sunil Bhat | Business transaction monitoring system and method |
US20030172036A1 (en) | 2002-03-05 | 2003-09-11 | Idan Feigenbaum | Online financial transaction veracity assurance mechanism |
US20030182551A1 (en) | 2002-03-25 | 2003-09-25 | Frantz Christopher J. | Method for a single sign-on |
US20030208684A1 (en) | 2000-03-08 | 2003-11-06 | Camacho Luz Maria | Method and apparatus for reducing on-line fraud using personal digital identification |
US20030233553A1 (en) | 2002-06-13 | 2003-12-18 | Microsoft Corporation | Secure clock on computing device such as may be required in connection with a trust-based system |
US20040006553A1 (en) | 2000-11-10 | 2004-01-08 | De Vries Glen M. | Method and apparatus of assuring informed consent while conducting secure clinical trials |
US6678666B1 (en) | 2000-06-05 | 2004-01-13 | Van W. Boulware | Method of conducting anti-fraud electronic bank security transactions having price-date-time variables and calculating apparatus thereof |
US20040034794A1 (en) | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US6718363B1 (en) | 1999-07-30 | 2004-04-06 | Verizon Laboratories, Inc. | Page aggregation for web sites |
WO2004038997A1 (en) | 2002-10-18 | 2004-05-06 | American Express Travel Related Services Company, Inc. | Device independent authentication system and method |
US20040105431A1 (en) | 2002-11-22 | 2004-06-03 | Telefonaktiebolaget Lm Ericsson | Authentication, authorization, and accounting (AAA) server |
US20040117321A1 (en) | 1999-07-30 | 2004-06-17 | Sancho Enrique David | System and method for secure network purchasing |
US20040181598A1 (en) | 2003-03-12 | 2004-09-16 | Microsoft Corporation | Managing state information across communication sessions between a client and a server via a stateless protocol |
US20040203750A1 (en) | 2002-10-16 | 2004-10-14 | Lee Cowdrey | Transport of records of roaming usage of mobile telecommunications networks |
US20040236696A1 (en) | 2003-05-23 | 2004-11-25 | Intelligent Wave, Inc. | History information adding program, fraud determining program using history information, and fraud determining system using history information |
US20040236702A1 (en) | 2003-05-21 | 2004-11-25 | Fink Ian M. | User fraud detection and prevention of access to a distributed network communication system |
US20040254890A1 (en) | 2002-05-24 | 2004-12-16 | Sancho Enrique David | System method and apparatus for preventing fraudulent transactions |
US20050033653A1 (en) | 2003-08-07 | 2005-02-10 | Ian Eisenberg | Electronic mail card purchase verification |
US20050033703A1 (en) | 2002-09-09 | 2005-02-10 | John Holdsworth | Systems and methods for enrolling a token in an online authentication program |
US20050076230A1 (en) | 2003-10-02 | 2005-04-07 | George Redenbaugh | Fraud tracking cookie |
US6895507B1 (en) * | 1999-07-02 | 2005-05-17 | Time Certain, Llc | Method and system for determining and maintaining trust in digital data files with certifiable time |
US6898709B1 (en) | 1999-07-02 | 2005-05-24 | Time Certain Llc | Personal computer system and methods for proving dates in digital data files |
US20050113092A1 (en) | 2000-02-09 | 2005-05-26 | Coppinger Paul D. | System and method for deploying application programs |
US20050131826A1 (en) | 1999-10-27 | 2005-06-16 | Zix Corporation | Centralized authorization and fraud-prevention system for network-based transactions |
US6908030B2 (en) | 2001-10-31 | 2005-06-21 | Arcot Systems, Inc. | One-time credit card number generator and single round-trip authentication |
US20050188423A1 (en) | 2004-02-24 | 2005-08-25 | Covelight Systems, Inc. | Methods, systems and computer program products for monitoring user behavior for a server application |
US6957339B2 (en) * | 1999-12-10 | 2005-10-18 | Fujitsu Limited | User verification system, and portable electronic device with user verification function utilizing biometric information |
US20050278542A1 (en) | 2004-06-14 | 2005-12-15 | Greg Pierson | Network security and fraud detection system and method |
US20060010072A1 (en) | 2004-03-02 | 2006-01-12 | Ori Eisen | Method and system for identifying users and detecting fraud by use of the Internet |
US20060130132A1 (en) | 2000-08-29 | 2006-06-15 | Microsoft Corporation | Method and apparatus for encoding and storing session data |
US20060155985A1 (en) | 2002-11-14 | 2006-07-13 | France Telecom | Method and system with authentication, revocable anonymity and non-repudiation |
US7089585B1 (en) | 2000-08-29 | 2006-08-08 | Microsoft Corporation | Method and system for authorizing a client computer to access a server computer |
US7100049B2 (en) | 2002-05-10 | 2006-08-29 | Rsa Security Inc. | Method and apparatus for authentication of users and web sites |
US20060200856A1 (en) | 2005-03-02 | 2006-09-07 | Salowey Joseph A | Methods and apparatus to validate configuration of computerized devices |
US20060200855A1 (en) | 2005-03-07 | 2006-09-07 | Willis Taun E | Electronic verification systems |
US20060264202A1 (en) | 2003-07-11 | 2006-11-23 | Joachim Hagmeier | System and method for authenticating clients in a client-server environment |
US20060282660A1 (en) | 2005-04-29 | 2006-12-14 | Varghese Thomas E | System and method for fraud monitoring, detection, and tiered user authentication |
US20060281541A1 (en) | 2002-03-12 | 2006-12-14 | Igt. | Virtual player tracking and related services |
US20060287902A1 (en) | 2004-09-17 | 2006-12-21 | David Helsper | Fraud risk advisor |
US7165051B2 (en) | 1998-12-04 | 2007-01-16 | Digital River, Inc. | Electronic commerce system and method for detecting fraud |
US20070038568A1 (en) | 2004-09-17 | 2007-02-15 | Todd Greene | Fraud analyst smart cookie |
US20070043837A1 (en) | 2004-04-07 | 2007-02-22 | Abb Research Ltd | Method and system for producing web pages matched to client properties |
US7191467B1 (en) | 2002-03-15 | 2007-03-13 | Microsoft Corporation | Method and system of integrating third party authentication into internet browser code |
US7260837B2 (en) | 2000-03-22 | 2007-08-21 | Comscore Networks, Inc. | Systems and methods for user identification, user demographic reporting and collecting usage data usage biometrics |
US20070220594A1 (en) | 2006-03-04 | 2007-09-20 | Tulsyan Surendra K | Software based Dynamic Key Generator for Multifactor Authentication |
US20070234409A1 (en) | 2006-03-31 | 2007-10-04 | Ori Eisen | Systems and methods for detection of session tampering and fraud prevention |
US20070234070A1 (en) | 1999-07-29 | 2007-10-04 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US20070239606A1 (en) | 2004-03-02 | 2007-10-11 | Ori Eisen | Method and system for identifying users and detecting fraud by use of the internet |
US20070294401A1 (en) | 2006-06-19 | 2007-12-20 | Almondnet, Inc. | Providing collected profiles to media properties having specified interests |
US20080010678A1 (en) | 2004-09-17 | 2008-01-10 | Jeff Burdette | Authentication Proxy |
US7349955B1 (en) | 2000-02-11 | 2008-03-25 | Goamerica, Inc. | Method of and system for transferring data over a wireless communications network |
US20080104672A1 (en) | 2006-10-25 | 2008-05-01 | Iovation, Inc. | Detecting and preventing man-in-the-middle phishing attacks |
US20080104684A1 (en) | 2006-10-25 | 2008-05-01 | Iovation, Inc. | Creating and verifying globally unique device-specific identifiers |
US7577620B1 (en) | 2000-07-24 | 2009-08-18 | Donner Irah H | System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services |
US20100004965A1 (en) | 2008-07-01 | 2010-01-07 | Ori Eisen | Systems and methods of sharing information through a tagless device consortium |
US20110082768A1 (en) | 2004-03-02 | 2011-04-07 | The 41St Parameter, Inc. | Method and System for Identifying Users and Detecting Fraud by Use of the Internet |
-
2007
- 2007-09-26 US US11/862,165 patent/US9060012B2/en active Active
-
2008
- 2008-09-26 EP EP08165224A patent/EP2043328A3/en not_active Withdrawn
Patent Citations (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0418144A1 (en) | 1989-09-12 | 1991-03-20 | André MICHAUD | Method for limiting risks connected to a computer transaction |
US20030070080A1 (en) | 1991-11-15 | 2003-04-10 | Rosen Sholom S. | Electronic-monetary system |
US5764275A (en) | 1991-11-20 | 1998-06-09 | Thomson Multimedia S.A. | Interactive television security through transaction time stamping |
US6205436B1 (en) | 1994-04-28 | 2001-03-20 | Citibank, N.A. | Trusted agents for open electronic commerce where the transfer of electronic merchandise or electronic money is provisional until the transaction is finalized |
US20020112171A1 (en) * | 1995-02-13 | 2002-08-15 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5748740A (en) | 1995-09-29 | 1998-05-05 | Dallas Semiconductor Corporation | Method, apparatus, system and firmware for secure transactions |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6105012A (en) | 1997-04-22 | 2000-08-15 | Sun Microsystems, Inc. | Security system and method for financial institution server and client web browser |
US6163771A (en) | 1997-08-28 | 2000-12-19 | Walker Digital, Llc | Method and device for generating a single-use financial account number |
US6112240A (en) | 1997-09-03 | 2000-08-29 | International Business Machines Corporation | Web site client information tracker |
US6148407A (en) | 1997-09-30 | 2000-11-14 | Intel Corporation | Method and apparatus for producing computer platform fingerprints |
EP0923039A1 (en) | 1997-12-12 | 1999-06-16 | SellectSoft L.C. | Electronic couponing method and apparatus |
US20020073327A1 (en) * | 1998-01-14 | 2002-06-13 | Vellandi Henry P. | Electronic bookshelf with multi-user features |
US6092053A (en) | 1998-10-07 | 2000-07-18 | Cybercash, Inc. | System and method for merchant invoked electronic commerce |
US7165051B2 (en) | 1998-12-04 | 2007-01-16 | Digital River, Inc. | Electronic commerce system and method for detecting fraud |
US20020056042A1 (en) | 1999-06-23 | 2002-05-09 | Van Der Kaay Erik H. | System and methods for generating trusted and authenticatable time stamps for electronic documents |
US6898709B1 (en) | 1999-07-02 | 2005-05-24 | Time Certain Llc | Personal computer system and methods for proving dates in digital data files |
US6895507B1 (en) * | 1999-07-02 | 2005-05-17 | Time Certain, Llc | Method and system for determining and maintaining trust in digital data files with certifiable time |
US20070234070A1 (en) | 1999-07-29 | 2007-10-04 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US20050108177A1 (en) | 1999-07-30 | 2005-05-19 | Sancho Enrique D. | System and method for secure network purchasing |
US20020073046A1 (en) | 1999-07-30 | 2002-06-13 | David Sancho Enrique | System and method for secure network purchasing |
US20040117321A1 (en) | 1999-07-30 | 2004-06-17 | Sancho Enrique David | System and method for secure network purchasing |
US6718363B1 (en) | 1999-07-30 | 2004-04-06 | Verizon Laboratories, Inc. | Page aggregation for web sites |
US6892307B1 (en) | 1999-08-05 | 2005-05-10 | Sun Microsystems, Inc. | Single sign-on framework with trust-level mapping to authentication requirements |
WO2001011450A1 (en) | 1999-08-05 | 2001-02-15 | Sun Microsystems, Inc. | Single sign-on framework with trust-level mapping to authentication requirements |
US20050131826A1 (en) | 1999-10-27 | 2005-06-16 | Zix Corporation | Centralized authorization and fraud-prevention system for network-based transactions |
US6957339B2 (en) * | 1999-12-10 | 2005-10-18 | Fujitsu Limited | User verification system, and portable electronic device with user verification function utilizing biometric information |
US20050113092A1 (en) | 2000-02-09 | 2005-05-26 | Coppinger Paul D. | System and method for deploying application programs |
US7349955B1 (en) | 2000-02-11 | 2008-03-25 | Goamerica, Inc. | Method of and system for transferring data over a wireless communications network |
US20010016876A1 (en) | 2000-02-19 | 2001-08-23 | Gerold Kurth | Method and apparatus to provide high precision packet traversal time statistics in a heterogeneous network |
US20030208684A1 (en) | 2000-03-08 | 2003-11-06 | Camacho Luz Maria | Method and apparatus for reducing on-line fraud using personal digital identification |
US7260837B2 (en) | 2000-03-22 | 2007-08-21 | Comscore Networks, Inc. | Systems and methods for user identification, user demographic reporting and collecting usage data usage biometrics |
US20040034794A1 (en) | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US6678666B1 (en) | 2000-06-05 | 2004-01-13 | Van W. Boulware | Method of conducting anti-fraud electronic bank security transactions having price-date-time variables and calculating apparatus thereof |
WO2001095550A2 (en) | 2000-06-06 | 2001-12-13 | Ontime Networks As | Distributing time information in a communication network |
US20020035622A1 (en) | 2000-06-07 | 2002-03-21 | Barber Timothy P. | Online machine data collection and archiving process |
US20080133420A1 (en) | 2000-06-07 | 2008-06-05 | First Data Corporation | Online machine data collection and archiving process |
US7330871B2 (en) | 2000-06-07 | 2008-02-12 | Telecheck Services, Inc. | Online machine data collection and archiving process |
US20030105854A1 (en) | 2000-07-06 | 2003-06-05 | Vilhjalmur Thorsteinsson | Method and system for controlling and coordinating devices and appliances, such as from a central portal and via a wide-area communications network |
US7577620B1 (en) | 2000-07-24 | 2009-08-18 | Donner Irah H | System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services |
US20060130132A1 (en) | 2000-08-29 | 2006-06-15 | Microsoft Corporation | Method and apparatus for encoding and storing session data |
US7089585B1 (en) | 2000-08-29 | 2006-08-08 | Microsoft Corporation | Method and system for authorizing a client computer to access a server computer |
US20040006553A1 (en) | 2000-11-10 | 2004-01-08 | De Vries Glen M. | Method and apparatus of assuring informed consent while conducting secure clinical trials |
US20020167965A1 (en) | 2001-01-18 | 2002-11-14 | James Beasley | Link context mobility method and system for providing such mobility, such as a system employing short range frequency hopping spread spectrum wireless protocols |
US20020153424A1 (en) | 2001-04-19 | 2002-10-24 | Chuan Li | Method and apparatus of secure credit card transaction |
US20020156836A1 (en) | 2001-04-24 | 2002-10-24 | Janosik John Louis | Method for extracting personalization information from web activity |
EP1256911A1 (en) | 2001-05-07 | 2002-11-13 | Cegetel | Securization method for a payment from a client to a merchant, associated location server and system |
WO2002091226A1 (en) | 2001-05-08 | 2002-11-14 | Rolf Fey | Method for detecting and identifying accesses to electronic documents |
US20030033356A1 (en) | 2001-08-13 | 2003-02-13 | Luu Tran | Extensible client aware detection in a wireless portal system |
WO2003025868A1 (en) | 2001-09-17 | 2003-03-27 | Interline Networks Pty Ltd | A method and system for reducing the risk of credit card fraud |
US20030076242A1 (en) | 2001-09-25 | 2003-04-24 | Burns Gordon R. | Utility meter having computer network access for receiving an interpretive language program to implement new meter functionality |
US6908030B2 (en) | 2001-10-31 | 2005-06-21 | Arcot Systems, Inc. | One-time credit card number generator and single round-trip authentication |
US20030115334A1 (en) | 2001-11-05 | 2003-06-19 | Sunil Bhat | Business transaction monitoring system and method |
WO2003075197A3 (en) | 2002-03-05 | 2003-12-31 | Speedbit Ltd | Online financial transaction veracity assurance mechanism |
US20030172036A1 (en) | 2002-03-05 | 2003-09-11 | Idan Feigenbaum | Online financial transaction veracity assurance mechanism |
WO2003075197A2 (en) | 2002-03-05 | 2003-09-12 | Speedbit Ltd. | Online financial transaction veracity assurance mechanism |
US20060281541A1 (en) | 2002-03-12 | 2006-12-14 | Igt. | Virtual player tracking and related services |
US7191467B1 (en) | 2002-03-15 | 2007-03-13 | Microsoft Corporation | Method and system of integrating third party authentication into internet browser code |
US20030182551A1 (en) | 2002-03-25 | 2003-09-25 | Frantz Christopher J. | Method for a single sign-on |
US7100049B2 (en) | 2002-05-10 | 2006-08-29 | Rsa Security Inc. | Method and apparatus for authentication of users and web sites |
US20040254890A1 (en) | 2002-05-24 | 2004-12-16 | Sancho Enrique David | System method and apparatus for preventing fraudulent transactions |
US20030233553A1 (en) | 2002-06-13 | 2003-12-18 | Microsoft Corporation | Secure clock on computing device such as may be required in connection with a trust-based system |
US20050033703A1 (en) | 2002-09-09 | 2005-02-10 | John Holdsworth | Systems and methods for enrolling a token in an online authentication program |
US20040203750A1 (en) | 2002-10-16 | 2004-10-14 | Lee Cowdrey | Transport of records of roaming usage of mobile telecommunications networks |
US20070204044A1 (en) | 2002-10-18 | 2007-08-30 | American Express Travel Related Services Company, Inc. | Device independent authentication system and method |
WO2004038997A1 (en) | 2002-10-18 | 2004-05-06 | American Express Travel Related Services Company, Inc. | Device independent authentication system and method |
US20060155985A1 (en) | 2002-11-14 | 2006-07-13 | France Telecom | Method and system with authentication, revocable anonymity and non-repudiation |
US20040105431A1 (en) | 2002-11-22 | 2004-06-03 | Telefonaktiebolaget Lm Ericsson | Authentication, authorization, and accounting (AAA) server |
US20040181598A1 (en) | 2003-03-12 | 2004-09-16 | Microsoft Corporation | Managing state information across communication sessions between a client and a server via a stateless protocol |
US20040236702A1 (en) | 2003-05-21 | 2004-11-25 | Fink Ian M. | User fraud detection and prevention of access to a distributed network communication system |
US20040236696A1 (en) | 2003-05-23 | 2004-11-25 | Intelligent Wave, Inc. | History information adding program, fraud determining program using history information, and fraud determining system using history information |
US20060264202A1 (en) | 2003-07-11 | 2006-11-23 | Joachim Hagmeier | System and method for authenticating clients in a client-server environment |
US20050033653A1 (en) | 2003-08-07 | 2005-02-10 | Ian Eisenberg | Electronic mail card purchase verification |
US20050076230A1 (en) | 2003-10-02 | 2005-04-07 | George Redenbaugh | Fraud tracking cookie |
US20050188423A1 (en) | 2004-02-24 | 2005-08-25 | Covelight Systems, Inc. | Methods, systems and computer program products for monitoring user behavior for a server application |
US7853533B2 (en) | 2004-03-02 | 2010-12-14 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US20090037213A1 (en) | 2004-03-02 | 2009-02-05 | Ori Eisen | Method and system for identifying users and detecting fraud by use of the internet |
US20110082768A1 (en) | 2004-03-02 | 2011-04-07 | The 41St Parameter, Inc. | Method and System for Identifying Users and Detecting Fraud by Use of the Internet |
US20060010072A1 (en) | 2004-03-02 | 2006-01-12 | Ori Eisen | Method and system for identifying users and detecting fraud by use of the Internet |
US8862514B2 (en) | 2004-03-02 | 2014-10-14 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US20070239606A1 (en) | 2004-03-02 | 2007-10-11 | Ori Eisen | Method and system for identifying users and detecting fraud by use of the internet |
US20070043837A1 (en) | 2004-04-07 | 2007-02-22 | Abb Research Ltd | Method and system for producing web pages matched to client properties |
US20050278542A1 (en) | 2004-06-14 | 2005-12-15 | Greg Pierson | Network security and fraud detection system and method |
US7272728B2 (en) | 2004-06-14 | 2007-09-18 | Iovation, Inc. | Network security and fraud detection system and method |
US20060048211A1 (en) | 2004-06-14 | 2006-03-02 | Greg Pierson | Network security and fraud detection system and method |
US20070073630A1 (en) | 2004-09-17 | 2007-03-29 | Todd Greene | Fraud analyst smart cookie |
US20080010678A1 (en) | 2004-09-17 | 2008-01-10 | Jeff Burdette | Authentication Proxy |
US20070038568A1 (en) | 2004-09-17 | 2007-02-15 | Todd Greene | Fraud analyst smart cookie |
US20060287902A1 (en) | 2004-09-17 | 2006-12-21 | David Helsper | Fraud risk advisor |
US7438226B2 (en) | 2004-09-17 | 2008-10-21 | Digital Envoy, Inc. | Fraud risk advisor |
US20060200856A1 (en) | 2005-03-02 | 2006-09-07 | Salowey Joseph A | Methods and apparatus to validate configuration of computerized devices |
US20060200855A1 (en) | 2005-03-07 | 2006-09-07 | Willis Taun E | Electronic verification systems |
US20060282660A1 (en) | 2005-04-29 | 2006-12-14 | Varghese Thomas E | System and method for fraud monitoring, detection, and tiered user authentication |
US20070220594A1 (en) | 2006-03-04 | 2007-09-20 | Tulsyan Surendra K | Software based Dynamic Key Generator for Multifactor Authentication |
US8151327B2 (en) | 2006-03-31 | 2012-04-03 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US20120174223A1 (en) | 2006-03-31 | 2012-07-05 | Ori Eisen | Systems and methods for detection of session tampering and fraud prevention |
US8826393B2 (en) | 2006-03-31 | 2014-09-02 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US20070234409A1 (en) | 2006-03-31 | 2007-10-04 | Ori Eisen | Systems and methods for detection of session tampering and fraud prevention |
US20070294401A1 (en) | 2006-06-19 | 2007-12-20 | Almondnet, Inc. | Providing collected profiles to media properties having specified interests |
US20080104684A1 (en) | 2006-10-25 | 2008-05-01 | Iovation, Inc. | Creating and verifying globally unique device-specific identifiers |
US20080104672A1 (en) | 2006-10-25 | 2008-05-01 | Iovation, Inc. | Detecting and preventing man-in-the-middle phishing attacks |
US20100004965A1 (en) | 2008-07-01 | 2010-01-07 | Ori Eisen | Systems and methods of sharing information through a tagless device consortium |
Non-Patent Citations (40)
Title |
---|
"Office action dated Mar. 19, 2015 for U.S. Appl. No. 12/496,572.". |
Derfler, et al. How Network Work. Millennium Ed., Que Corporation. Indianapolis. IN. 2000. |
European search report and written opinion dated Nov. 15, 2010 for Application No. 08165224.0. |
European search report dated Dec. 23, 2011 for Application No. 5818903.6. |
Gralla, Preston. How the Internet Works. Millennium Ed., Que Corporation. Indianapolis, IN 1999. |
International search report dated Jul. 3, 2008 for PCT Application No. US2007/65776. |
International search report dated Oct. 29, 2007 for PCT Application No. US2005/35532. |
Kohno, et al. Remote Physical Device Fingerprinting. 2005 IEEE Syposium on Security and Privacy (IEEE S&P 2005); May 8-11, 2005; Oakland, California, U.S.A. 16 pages. |
Manavoglu, et al. Probabilistic user behavior models. Data Mining. 2003; 203-210. |
Notice of allowance dated Apr. 30, 2014 for U.S. Appl. No. 13/414,678. |
Notice of allowance dated Jan. 3, 2012 for U.S. Appl. No. 11/694,882. |
Notice of allowance dated Jun. 10, 2014 for U.S. Appl. No. 12/248,867. |
Notice of allowance dated Jun. 24, 2010 for U.S. Appl. No. 11/241,739. |
Office action dated Apr. 20, 2012 for U.S. Appl. No. 12/732,034. |
Office action dated Aug. 23, 2010 for U.S. Appl. No. 11/694,882. |
Office action dated Dec. 23, 2009 for U.S. Appl. No. 11/694,882. |
Office action dated Dec. 7, 2007 for U.S. Appl. No. 10/791,439. |
Office action dated Feb. 24, 2009 for U.S. Appl. No. 11/694,882. |
Office action dated Jan. 6, 2010 for U.S. Appl. No. 11/241,739. |
Office action dated Jul. 1, 2009 for U.S. Appl. No. 11/241,739. |
Office action dated Jun. 1, 2011 for U.S. Appl. No. 11/694,882. |
Office action dated Jun. 11, 2008 for U.S. Appl. No. 11/694,882. |
Office action dated Mar. 13, 2014 for U.S. Appl. No. 12/732,034. |
Office action dated Mar. 14, 2012 for U.S. Appl. No. 12/892,868. |
Office action dated Mar. 26, 2013 for U.S. Appl. No. 12/248,867. |
Office action dated Mar. 27, 2013 for U.S. Appl. No. 12/496,572. |
Office action dated Mar. 3, 2008 for U.S. Appl. No. 11/241,739. |
Office action dated Mar. 4, 2010 for U.S. Appl. No. 12/248,867. |
Office action dated Mar. 9, 2009 for U.S. Appl. No. 11/241,739. |
Office action dated May 9, 2008 for U.S. Appl. No. 10/791,439. |
Office action dated Nov. 15, 2012 for U.S. Appl. No. 12/732,034. |
Office action dated Nov. 19, 2012 for U.S. Appl. No. 12/892,868. |
Office action dated Nov. 22, 2010 for U.S. Appl. No. 12/248,867. |
Office action dated Oct. 2, 2013 for U.S. Appl. No. 12/496,572. |
Office action dated Sep. 10, 2013 for U.S. Appl. No. 13/414,678. |
Office action dated Sep. 16, 2008 for U.S. Appl. No. 11/241,739. |
Office action dated Sep. 19, 2014 for U.S. Appl. No. 12/732,034. |
U.S. Appl. No. 12/732,034, entitled "Systems and Methods of Sharing Iinformation Through a Tag-Based Consortium", filed Mar. 25, 2010, Eisen. |
U.S. Appl. No. 14/473,818, filed Aug. 29, 2014, Eisen. |
White, Ron. How Computers Work. Millennium Ed., Que Corporation. Indianapolis, IN. 1999. |
Cited By (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11238456B2 (en) | 2003-07-01 | 2022-02-01 | The 41St Parameter, Inc. | Keystroke analysis |
US10453066B2 (en) | 2003-07-01 | 2019-10-22 | The 41St Parameter, Inc. | Keystroke analysis |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US11683326B2 (en) | 2004-03-02 | 2023-06-20 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US9703983B2 (en) | 2005-12-16 | 2017-07-11 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US12079368B2 (en) | 2005-12-16 | 2024-09-03 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US10726151B2 (en) | 2005-12-16 | 2020-07-28 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US11195225B2 (en) | 2006-03-31 | 2021-12-07 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US9754311B2 (en) | 2006-03-31 | 2017-09-05 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US10535093B2 (en) | 2006-03-31 | 2020-01-14 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US11727471B2 (en) | 2006-03-31 | 2023-08-15 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US10089679B2 (en) | 2006-03-31 | 2018-10-02 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US9196004B2 (en) | 2006-03-31 | 2015-11-24 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US12093992B2 (en) | 2006-03-31 | 2024-09-17 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US9390384B2 (en) | 2008-07-01 | 2016-07-12 | The 41 St Parameter, Inc. | Systems and methods of sharing information through a tagless device consortium |
US10616201B2 (en) | 2009-03-25 | 2020-04-07 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US12132719B2 (en) | 2009-03-25 | 2024-10-29 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US11750584B2 (en) | 2009-03-25 | 2023-09-05 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US9948629B2 (en) | 2009-03-25 | 2018-04-17 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US9754256B2 (en) | 2010-10-19 | 2017-09-05 | The 41St Parameter, Inc. | Variable risk engine |
US11314838B2 (en) | 2011-11-15 | 2022-04-26 | Tapad, Inc. | System and method for analyzing user device information |
US9633201B1 (en) | 2012-03-01 | 2017-04-25 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US11886575B1 (en) | 2012-03-01 | 2024-01-30 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US11010468B1 (en) | 2012-03-01 | 2021-05-18 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US11683306B2 (en) | 2012-03-22 | 2023-06-20 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US10341344B2 (en) | 2012-03-22 | 2019-07-02 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US10862889B2 (en) | 2012-03-22 | 2020-12-08 | The 41St Parameter, Inc. | Methods and systems for persistent cross application mobile device identification |
US9521551B2 (en) | 2012-03-22 | 2016-12-13 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US12058131B2 (en) | 2012-03-22 | 2024-08-06 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US10021099B2 (en) | 2012-03-22 | 2018-07-10 | The 41st Paramter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US10417637B2 (en) | 2012-08-02 | 2019-09-17 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US12002053B2 (en) | 2012-08-02 | 2024-06-04 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US11301860B2 (en) | 2012-08-02 | 2022-04-12 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US11922423B2 (en) | 2012-11-14 | 2024-03-05 | The 41St Parameter, Inc. | Systems and methods of global identification |
US10395252B2 (en) | 2012-11-14 | 2019-08-27 | The 41St Parameter, Inc. | Systems and methods of global identification |
US11410179B2 (en) | 2012-11-14 | 2022-08-09 | The 41St Parameter, Inc. | Systems and methods of global identification |
US9990631B2 (en) | 2012-11-14 | 2018-06-05 | The 41St Parameter, Inc. | Systems and methods of global identification |
US10853813B2 (en) | 2012-11-14 | 2020-12-01 | The 41St Parameter, Inc. | Systems and methods of global identification |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US12045736B1 (en) | 2013-08-30 | 2024-07-23 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US11657299B1 (en) | 2013-08-30 | 2023-05-23 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US11240326B1 (en) | 2014-10-14 | 2022-02-01 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US11895204B1 (en) | 2014-10-14 | 2024-02-06 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US10728350B1 (en) | 2014-10-14 | 2020-07-28 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
CN105827608B (en) * | 2016-03-31 | 2019-02-12 | 微梦创科网络科技(中国)有限公司 | Distributed API service abnormal user identifying and analyzing method and reverse proxy gateway |
CN105827608A (en) * | 2016-03-31 | 2016-08-03 | 微梦创科网络科技(中国)有限公司 | Distributed API service abnormal user identification analysis method and reverse agent service gateway |
CN106210091A (en) * | 2016-07-18 | 2016-12-07 | 百融(北京)金融信息服务股份有限公司 | Mark generates and management method and system |
US11151568B2 (en) * | 2018-05-09 | 2021-10-19 | Capital One Services, Llc | Real-time selection of authentication procedures based on risk assessment |
US20220027919A1 (en) * | 2018-05-09 | 2022-01-27 | Capital One Services, Llc | Real-time selection of authentication procedures based on risk assessment |
US11605087B2 (en) * | 2018-08-15 | 2023-03-14 | Advanced New Technologies Co., Ltd. | Method and apparatus for identifying identity information |
US11538063B2 (en) | 2018-09-12 | 2022-12-27 | Samsung Electronics Co., Ltd. | Online fraud prevention and detection based on distributed system |
US11847668B2 (en) * | 2018-11-16 | 2023-12-19 | Bread Financial Payments, Inc. | Automatically aggregating, evaluating, and providing a contextually relevant offer |
US11164206B2 (en) * | 2018-11-16 | 2021-11-02 | Comenity Llc | Automatically aggregating, evaluating, and providing a contextually relevant offer |
US20220027934A1 (en) * | 2018-11-16 | 2022-01-27 | Comenity Llc | Automatically aggregating, evaluating, and providing a contextually relevant offer |
Also Published As
Publication number | Publication date |
---|---|
EP2043328A3 (en) | 2010-12-15 |
EP2043328A2 (en) | 2009-04-01 |
US20090083184A1 (en) | 2009-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9060012B2 (en) | Methods and apparatus for detecting fraud with time based computer tags | |
US12132719B2 (en) | Systems and methods of sharing information through a tag-based consortium | |
US11232496B2 (en) | System and method for providing limited access to data | |
US8776225B2 (en) | Network security and fraud detection system and method | |
US9426134B2 (en) | Method and systems for the authentication of a user | |
US20040254890A1 (en) | System method and apparatus for preventing fraudulent transactions | |
US20130226813A1 (en) | Cyberspace Identification Trust Authority (CITA) System and Method | |
JP3228339U (en) | Personal authentication and verification system and method | |
CA2937850A1 (en) | Verification of portable consumer devices | |
US20160239832A1 (en) | Payment system | |
Sharma et al. | e‐Commerce security: Threats, issues, and methods | |
Daniel et al. | Awareness in e-Banking Security and usage | |
Fujinoki et al. | Fail-safe security architecture to prevent privacy leaks from e-commerce servers. | |
AU2016203876B2 (en) | Verification of portable consumer devices | |
Igor | SECURITY FEATURES OF INNOVATIVE ELECTRONIC COMMERCE ON THE INTERNET NETWORK | |
Mahajan | Security Issues and Guidelines for a Successful E-Commerce System | |
Christiansen | A NEW ‘UNEXPOSED KEYS’ALGORITHM FOR BETTER PROTECTION OF STORED PAYMENT CARD INFORMATION | |
Frei | Why your data breach is my problem | |
Rachana | A Review of Security System in E-Banking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: THE 41ST PARAMETER, INC., ARIZONA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EISEN, ORI;REEL/FRAME:020223/0858 Effective date: 20071101 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |